A method for protecting an electronic entity such as a smart card, against simple/differential power analysis, by integrating a current accumulator in said entity. The current accumulator (19) powers a processor (P) via a multiplexer (20) when the processor is loaded to execute so-called sensitive operations.
|
1. An encrypted access electronic entity comprising:
a microcircuit for executing operations;
a connector interface for coupling said microcircuit to a server adapted to provide power to said microcircuit via said connector interface;
an integrated battery; and
a selector device to connect at least one portion of said microcircuit to said battery when predetermined operations are being executed by said at least one portion of said microcircuit,
wherein said microcircuit comprises a processor and said selector device includes a multiplexer controlled by said processor, said multiplexer having two inputs, one of which is connected to said connector interface and the other of which is connected to said battery, an output of said multiplexer being connected to an electrical power supply input of said processor, and wherein said multiplexer is commanded by said processor to selectively connect said output to one or the other of said inputs.
2. The electronic entity according to
3. The electronic entity according to
4. The electronic entity according to
5. The electronic entity according to
6. The electronic entity according to
7. The electronic entity according to
8. The electronic entity according to
9. The electronic entity according to
10. The electronic entity according to
|
This is a National Stage application of PCT Application PCT/FR02/01058 filed Mar. 27, 2002 that claims the priority of French Application 01/04453 filed Apr. 2, 2001.
The invention relates to a method of protecting an electronic entity including a microcircuit, in particular a microcircuit card with encrypted access, said protection being aimed more particularly at forms of attack known as “current analysis”. The invention also relates to an electronic entity including a microcircuit, in particular a microcircuit card with encrypted access, equipped with means for obtaining the protection offered by said method.
The person skilled in the art knows that some electronic entities with encrypted access, in particular microcircuit cards, are vulnerable to certain forms of attack based on analyzing certain parameters during a phase of their operation. It is said that information can “leak” from a computation carried out in said electronic entity (the card), typically the execution of a cryptographic protocol instigated by a fraudster in illegal possession of the card. The parameters analyzed during the execution of this kind of protocol can typically be computation time differences or differences in electromagnetic radiation during execution of the computation, but above all are the current consumed by the electronic entity itself during the execution of a cryptographic protocol.
Thus a standard attack consists in having the electronic entity that has fallen into the hands of the fraudster execute a certain number of cryptographic protocols based on random messages, which are therefore bound to fail, but cause the entity (the microcircuit card) to execute each time a cryptographic algorithm, for example the DES (DATA ENCRYPTION STANDARD) algorithm, and analyzing the current consumed during each execution of said DES algorithm. The object of this attack is to discover the secret key of said entity. The DES algorithm is very widely used at present in the field of bank cards, SIM (GSM) cards, pay per view television access cards, and access control cards.
In the case of fraud, i.e. when the fraudster has the card and is seeking to determine the key, the fraudster can connect said card to a reader by means of which he can transmit messages to it and connect it to means for recording the current consumed by the microcircuit during the execution of the operations that it carries out. The fraudster instigates multiple execution of the DES algorithm and the current consumption is detected and memorized each time. From all of this data, and in particular from the current consumption measurements, it is possible to mount attacks whose principle is well known. These SPA-DPA (Simple Power Analysis/Differential Power Analysis) attacks can reconstitute the key of the electronic entity.
In a paper presented on 17 Aug. 2000 at the CHES 2000 conference and published by SPRINGER under the N° 1965, the use of a battery integrated into the electronic entity to supply power to the microcircuit is envisaged. However, the author of the paper finishes by setting aside this solution, deeming it somewhat impractical and difficult to put into practice. The invention solves the problems referred to by the author of this paper.
To be more precise, the invention provides a method of protecting a microcircuit electronic entity such as a microcircuit card against current analysis attack, of the type consisting in associating with said microcircuit an energy store placed inside said entity, characterized in that, during an exchange of information in which said entity is coupled to a server adapted to provide it with an electrical power supply, at least a portion of said microcircuit is supplied with electrical power provided by said energy store during the execution of predetermined operations by said at least one portion of said microcircuit, said server supplying electrical power to said microcircuit during the execution of other operations.
The aforementioned energy store can be a battery, preferably a rechargeable battery. In this case, the battery can be charged on each transaction, i.e. each time that the electronic entity is coupled to a server capable of supplying to it the necessary electrical energy. The microcircuit is preferably designed and programmed to command charging of the battery outside time periods in which it is being used to supply power to the microcircuit or the portion of the microcircuit responsible for executing said predetermined operations. Instead of this, or in addition to this, said battery can be charged with solar energy by means of a photoelectric cell integrated into the electronic entity. In the current state of the art it is possible to envisage integrating into the thickness of a card at least one battery or rechargeable battery and also a photoelectric cell.
The aforementioned predetermined operations during which the microcircuit or a portion thereof is supplied with power internally and not by the server to which the electronic entity is connected (which could in fact be a device designed to break the secret codes of the card) are all exchanges of “sensitive” information, during which confidential data is exchanged. These operations are, for example, cryptographic algorithms during which keys are used or exchanged, the procedure for verifying the PIN, etc.
Alternatively, said predetermined operations can be executed by a coprocessor supplied with power by said battery while other operations are executed by a main processor supplied with power by said server. Another solution is to switch a main processor so that it is supplied with power by said battery while it is executing said predetermined “sensitive” operations, during which time periods said server supplies power to a decoy circuit, which continues to carry out operations and therefore to simulate consumption of current. However, the simulated current consumption is independent of the sensitive predetermined operations that are being executed at that time. This makes it impossible to recover sensitive data such as cryptographic keys, the PIN, etc. from a recording of the power supply current. Because the necessary current is being supplied by a battery or a rechargeable battery situated inside the electronic entity including the microcircuit, no information of interest relating to the operating status of the processor can “leak” out of the card, via the analysis of the current supplied by the server.
Even if the electronic entity is equipped with a simple non-rechargeable battery, the service life thereof is relatively long since said battery is used only to execute small program portions and not for all of the operations constituting a transaction between said electronic entity and the server. The use of a decoy or a coprocessor prevents an attacker from being able to determine the times at which the sensitive portions of the program are executed since, during those time intervals, the microcircuit continues to carry out operations, consuming current supplied by the external server.
The invention also provides an encrypted access electronic entity comprising a microcircuit and means for coupling the latter to a server itself provided with electrical power supply means for supplying power to said microcircuit via said coupling means, characterized in that it further includes an integrated energy store and selector means adapted to switch the power supply of at least a portion of said microcircuit to said energy store when predetermined operations are being executed by said at least one portion of said microcircuit.
In one embodiment, said selector means include a multiplexer or the like controlled by a processor of said microcircuit. The multiplexer has two inputs, one connected to a contact terminal for the connection to the electrical power supply means of said server and the other connected to said energy store. An output of said multiplexer is connected to an electrical power supply line of the processor. The processor commands the multiplexer to make the selection between the electrical power supply means of said server and said energy store integrated into said electronic entity.
The aforementioned contact terminal is one of the electrical contact regions that are usually found on the surface of a microcircuit card of the bank card or access control card type. However, some cards can be equipped with an antenna adapted to be coupled to an antenna situated in the server. The antenna system is used both for exchanging information and for supplying sufficient electrical energy to power the microcircuit. The invention also applies to this type of card, and in this case one of the inputs of the multiplexer is connected to a power supply circuit receiving its energy from the antenna integrated into the electronic entity (the card).
The invention will be better understood and other advantages of the invention will become more clearly apparent in the light of the following description of embodiments of an electronic entity protected by implementing the concept explained hereinabove, which description is given by way of example only and with reference to the appended drawings, in which:
Referring more particularly to
According to a noteworthy feature of the invention, a battery or a rechargeable battery 19 is accommodated within the thickness of the card. Moreover, the microcircuit includes selector means, for example essentially constituted of a multiplexer 20 or the like. The multiplexer is connected both to the contact terminal 16a intended to be connected to the electrical power supply of the server 12 and to one pole of the battery 19 housed within the thickness of the card. The other pole of the battery is connected to ground.
According to another advantageous feature, the microcircuit 15, and more particularly the microprocessor P, can include a decoy circuit 29 that is directly connected to the server coupling means, i.e. to the connection terminal 16a. This decoy circuit is commanded to execute operations when the remainder of the microcircuit or at least the portion thereof which executes said predetermined operations is being supplied with power by the battery 19.
In a further embodiment, shown in
Simplifying the
Patent | Priority | Assignee | Title |
10243088, | Dec 21 2017 | Capital One Services, LLC | Transaction card for transferring solar power |
10930801, | Dec 21 2017 | Capital One Services, LLC | Transaction card for transferring solar power |
7764786, | Sep 15 2004 | STMICROELECTRONICS FRANCE | Protection of a DES algorithm |
Patent | Priority | Assignee | Title |
4575621, | Mar 07 1984 | CORPRA, A CORP OF PA | Portable electronic transaction device and system therefor |
4843224, | Jun 12 1987 | Oki Electric Industry Co., Ltd. | IC card |
4985921, | Apr 11 1988 | SPA Syspatronic AG | Portable data carrying device |
6507913, | Dec 30 1999 | YEDA RESEARCH AND DEVELOPMENT CO LTD AN ISRAELI CO | Protecting smart cards from power analysis with detachable power supplies |
6561430, | Jan 10 2001 | SMART DISPLAYER TECHNOLOGY CO , LTD | IC card with display screen |
20020014537, | |||
DE19911673, | |||
FR2616941, | |||
FR2793904, | |||
WO108088, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 27 2002 | Oberthur Card Systems SA | (assignment on the face of the patent) | / | |||
Oct 02 2003 | DISCHAMP, PAUL | Oberthur Card Systems SA | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014434 | /0844 |
Date | Maintenance Fee Events |
Jun 01 2007 | ASPN: Payor Number Assigned. |
Oct 27 2010 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Oct 23 2014 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Oct 25 2018 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
May 22 2010 | 4 years fee payment window open |
Nov 22 2010 | 6 months grace period start (w surcharge) |
May 22 2011 | patent expiry (for year 4) |
May 22 2013 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 22 2014 | 8 years fee payment window open |
Nov 22 2014 | 6 months grace period start (w surcharge) |
May 22 2015 | patent expiry (for year 8) |
May 22 2017 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 22 2018 | 12 years fee payment window open |
Nov 22 2018 | 6 months grace period start (w surcharge) |
May 22 2019 | patent expiry (for year 12) |
May 22 2021 | 2 years to revive unintentionally abandoned end. (for year 12) |